Situational approach to information security

L. Astakhova, I. Zemtsov
{"title":"Situational approach to information security","authors":"L. Astakhova, I. Zemtsov","doi":"10.1109/USBEREIT.2018.8384570","DOIUrl":null,"url":null,"abstract":"The article justifies the imperatives of applying the situational approach to information security management (ISM). We modified the model of the Information Security Management System (ISMS), which is the basis of ISO/IEC 27005: 2011: we added the “Decision Making” stage after the “Determining the main criteria” step. The solution is to choose an approach to proccesing information security risks — their assessment, impact and taking — based on certain criteria. Using the developed algorithm, we implemented a cognitive software module of the information system management (ISM) in an educational institution. The use of the cognitive software module has significantly reduced the labor costs of specialists in the Information Security (IS) Department, including automation of the reporting procedures. The application of the situational approach allowed us to integrate a person into the automated system to ensure the cybersecurity of the educational sector.","PeriodicalId":176222,"journal":{"name":"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/USBEREIT.2018.8384570","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The article justifies the imperatives of applying the situational approach to information security management (ISM). We modified the model of the Information Security Management System (ISMS), which is the basis of ISO/IEC 27005: 2011: we added the “Decision Making” stage after the “Determining the main criteria” step. The solution is to choose an approach to proccesing information security risks — their assessment, impact and taking — based on certain criteria. Using the developed algorithm, we implemented a cognitive software module of the information system management (ISM) in an educational institution. The use of the cognitive software module has significantly reduced the labor costs of specialists in the Information Security (IS) Department, including automation of the reporting procedures. The application of the situational approach allowed us to integrate a person into the automated system to ensure the cybersecurity of the educational sector.
信息安全的情景方法
本文证明了将情景方法应用于信息安全管理(ISM)的必要性。我们修改了作为ISO/IEC 27005: 2011基础的信息安全管理体系(ISMS)的模型:我们在“确定主要标准”步骤之后增加了“决策”阶段。解决方案是选择一种方法来处理信息安全风险-他们的评估,影响和采取-基于一定的标准。利用所开发的算法,实现了教育机构信息系统管理(ISM)的认知软件模块。认知软件模块的使用大大降低了信息安全(IS)部门专家的劳动力成本,包括报告程序的自动化。情境方法的应用使我们能够将一个人集成到自动化系统中,以确保教育部门的网络安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信